ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Research

  • Malwarebytes Endpoint Protection & Response (EDR)

    Sponsored by: Malwarebytes

    According to a study, close to 60% of endpoints harbor hidden threats. These threats can disrupt productivity and cause financial and legal damage. In this solution brief, explore Malwarebytes’ Endpoint Protection and Response (EDR) platform and uncover its key features and benefits.

  • Cybercrime Tactics and Techniques: Ransomware Retrospective

    Sponsored by: Malwarebytes

    In this edition of Cybercrime Tactics and Techniques, take an in-depth look into ransomware attacks over the past few years – attack methods, common targets and notable subcategories. In addition, this report will consider where ransomware will go next, and how to prepare. Read on to reveal the full report.

  • Interview with Fraud Strategy Leader

    Sponsored by: Mitek Systems, Inc.

    In this Q and A, the fraud strategy leader at a mobile-only banking app sits down with the customer success leader at Mitek to talk about why customer experience is critical to business success and the vital role it plays in identity verification.

  • A Modern Approach to Endpoint Remediation

    Sponsored by: Malwarebytes

    According to incident response teams, 68% of cases they investigate are caused by malware. The costs and manpower required to remediate these issues is rising, and organizations need a modern approach to protecting their endpoints. In this solution brief, dive deeper into Malwarebytes’ modern approach to endpoint protection and response.

  • Buyer’s Guide Digital Identity Verification

    Sponsored by: Mitek Systems, Inc.

    Much of today’s customer interaction is done via digital interactions. As this trend continues to grow, organizations need to ensure that they balance customer experience with security. This buyer’s guide provides an overview of current identity verification tools as well as an evaluation workbook to steer you towards an informed decision.

  • How to Safeguard Against Cross-Site Scripting (XSS) Attacks

    Sponsored by: Tala Security

    Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.

  • Datrium Ransomware Protection

    Sponsored by: Datrium

    A recent study found that 1 in 2 companies have suffered a DR event in the past 2 years—and half of those from ransomware. In this white paper, Datrium highlights the categories of ransomware attacks and how to defend against them. Read on to learn more.

  • The Right Way to Combat Customer Journey Hijacking

    Sponsored by: Tala Security

    Most IT security teams focus on protecting user data, with little focus on user experience. By implementing a strategy that provides front-end and back-end protection, you can safeguard the interactions customers have with you, prevent the financial and reputational impacts of customer journey hijacking. Read on to get started.

  • Closing the Website Security Gap: Why a WAF Is Not Enough

    Sponsored by: Tala Security

    Although web application firewalls (WAFs) have a come a long way in recent years, they remain ineffective as a standalone security solution against Magecart cyberattacks. This white paper underlines the shortcomings of WAFs and highlights the importance of protecting the browser-side and the client-side from threats.

  • Alert Logic: SIEMless Threat Management

    Sponsored by: Alert Logic

    Ensuring security for AWS applications requires resource-intensive visibility and monitoring, which may be too costly for some users. This checklist highlights the key considerations for self-assessing your program to help guide you towards a more secure AWS application environment.

  • Your Email Security is Ineffective, and Getting Worse

    Sponsored by: Ironscales

    The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.

  • Javascript vs Javascript: Performance Penalty of Api Hooking

    Sponsored by: Tala Security

    While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.

  • Why Your Business Needs to Implement Web Security Standards

    Sponsored by: Tala Security

    With web-based attacks on e-commerce growing in volume and complexity, businesses need to fine-tune their website security tactics to avoid a major breach. This white paper highlights the current website security landscape and provides best-practices for future-proofing your business.

  • The Missing Link in Website Security

    Sponsored by: Tala Security

    Traditional back-end website security technologies are ineffective at maintaining security in today’s threat landscape – especially considering the additional pressures of regulatory requirements. In this white paper, take a look at the key gaps in the website security environment and explore ways to rethink current tactics.

  • The State of Security Segmentation

    Sponsored by: Illumio

    As cyberattacks grow increasingly common, it’s critical to look at how criminals operate in order to prevent damage. Read on to uncover the research findings of a recent study designed to shed light on the current state of security segmentation, and why it’s preferable compared to traditional firewalls.

  • Intelligent Security Starts at the Edge

    Sponsored by: Akamai Technologies

    In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.

  • Preventing Unknown, Zero-Day Attacks

    Sponsored by: Checkpoint Software Technologies

    The increasing reliance of mobile devices to conduct business operations organizations vulnerable to hackers who would look to expose these weaknesses. In this solution brief, learn more about the benefits and features of Check Point SandBlast Mobile and discover how it compares to similar industry offerings.

  • Application Shielding with Intertrust whiteCriterion Code Protection

    Sponsored by: Intertrust

    Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.

  • Preventing PeopleSoft Breaches

    Sponsored by: Appsian

    Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.

  • Decoding Customer IAM (CIAM) vs. IAM

    Sponsored by: Okta

    While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.

  • Pitney Bowes - Okta + F5 joint case study

    Sponsored by: Okta

    In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.

  • Build vs. Buy

    Sponsored by: Okta

    IT teams have increasingly turned to pre-built tools to offload some of the burden of application development. Customer identity and access management (CIAM) presents developers with a broad range of challenges that a trusted identity layer can help offload easily. Read on to explore the challenges and benefits of CIAM.

  • Assess Secure Web Gateways to Suit Your Network Security Needs

    Sponsored by: SearchSecurity.com

    Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.

  • 10 Commandments for Securing Microservices

    Sponsored by: Radware

    Before considering any next-generation WAF solution, make sure it meets the requirements of both development and operations (DevOps) and security teams. This resource provides a checklist of 10 characteristics to look for when considering protection to data and applications in a service mesh architecture.

  • Web Application Firewall Vendor Comparison Report

    Sponsored by: Barracuda

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.